Verifying anonymity in voting systems using CSP M Moran, J Heather, S Schneider Formal Aspects of Computing 26, 63-98, 2014 | 27 | 2014 |
Verification of STAR-Vote and Evaluation of FDR and ProVerif M Moran, DS Wallach Integrated Formal Methods: 13th International Conference, IFM 2017, Turin …, 2017 | 10 | 2017 |
Automated anonymity verification of the ThreeBallot and VAV voting systems M Moran, J Heather, S Schneider Software & Systems Modeling 15, 1049-1062, 2016 | 7 | 2016 |
Automated anonymity verification of the threeballot voting system M Moran, J Heather, S Schneider Integrated Formal Methods: 10th International Conference, IFM 2013, Turku …, 2013 | 5 | 2013 |
Automated analysis of voting systems with dolev-yao intruder model M Moran, J Heather Electronic Communications of the EASST 66, 2014 | 4 | 2014 |
Automated analysis of voting systems under an active intruder model in CSP M Moran, J Heather arXiv preprint arXiv:1705.00795, 2017 | 2 | 2017 |
An Introduction to Tools for Formal Analysis of Cryptographic Protocols M Moran, P Lafourcade, M Puys, D Williams Handbook of Formal Analysis and Verification in Cryptography, 105-152, 2023 | 1 | 2023 |
Theme issue on Integrated Formal Methods EB Johnsen, L Petre Software & Systems Modeling 15, 933-935, 2016 | | 2016 |
Automated Privacy Verification of Voting Systems M Moran PQDT-UK & Ireland, 2013 | | 2013 |
Anonymity and CSP for Voting Systems M Moran, J Heather, S Schneider CryptoForma 2011, 2011 | | 2011 |